Lucene search

K
ubuntucveUbuntu.comUB:CVE-2015-2925
HistoryApr 06, 2015 - 12:00 a.m.

CVE-2015-2925

2015-04-0600:00:00
ubuntu.com
ubuntu.com
26

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

9.3%

The prepend_path function in fs/dcache.c in the Linux kernel before 4.2.4
does not properly handle rename actions inside a bind mount, which allows
local users to bypass an intended container protection mechanism by
renaming a directory, related to a “double-chroot attack.”

Bugs

Notes

Author Note
jdstrand android kernels (flo, goldfish, grouper, maguro, mako and manta) are not supported on the Ubuntu Touch 14.10 and earlier preview kernels linux-lts-saucy no longer receives official support linux-lts-quantal no longer receives official support
kamal See gmane-151103 article for more backport discussion, specifically that Eric B.'s backport eliminates the requirement for this patch: 70291ae namei: lift (open-coded) terminate_walk() in follow_dotdot_rcu() into callers
OSVersionArchitecturePackageVersionFilename
ubuntu12.04noarchlinux< 3.2.0-93.133UNKNOWN
ubuntu14.04noarchlinux< 3.13.0-67.110UNKNOWN
ubuntu15.04noarchlinux< 3.19.0-32.37UNKNOWN
ubuntu12.04noarchlinux-armadaxp< 3.2.0-1659.83UNKNOWN
ubuntu12.04noarchlinux-lts-trusty< 3.13.0-67.110~precise1UNKNOWN
ubuntu14.04noarchlinux-lts-utopic< 3.16.0-52.71~14.04.1UNKNOWN
ubuntu14.04noarchlinux-lts-vivid< 3.19.0-32.37~14.04.1UNKNOWN
ubuntu12.04noarchlinux-ti-omap4< 3.2.0-1473.95UNKNOWN

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

9.3%